Skip to main content

CVE-2025-5443: OS Command Injection in Linksys RE6500

Medium
VulnerabilityCVE-2025-5443cvecve-2025-5443
Published: Mon Jun 02 2025 (06/02/2025, 11:31:04 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: RE6500

Description

A vulnerability, which was classified as critical, was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function wirelessAdvancedHidden of the file /goform/wirelessAdvancedHidden. The manipulation of the argument ExtChSelector/24GSelector/5GSelector leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/11/2025, 08:03:40 UTC

Technical Analysis

CVE-2025-5443 is a medium-severity OS command injection vulnerability affecting multiple Linksys range extender models, including RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000, across several firmware versions (1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001). The vulnerability resides in the wirelessAdvancedHidden function of the /goform/wirelessAdvancedHidden endpoint. Specifically, the parameters ExtChSelector, 24GSelector, and 5GSelector can be manipulated to inject arbitrary OS commands. This flaw allows an unauthenticated remote attacker to execute system commands on the device without requiring user interaction or prior authentication. The vulnerability is remotely exploitable over the network, potentially enabling attackers to compromise the device's operating system, gain control over the device, and pivot into the internal network. Despite the critical nature of command injection vulnerabilities, this issue has been rated medium severity with a CVSS 4.0 score of 5.3, reflecting some mitigating factors such as limited scope or impact on confidentiality, integrity, and availability. The vendor has not responded to early disclosure attempts, and no patches or mitigations have been officially released. Public exploit code has been disclosed, increasing the risk of exploitation in the wild.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security, especially for those relying on Linksys range extenders in their infrastructure. Successful exploitation could lead to full compromise of the affected devices, allowing attackers to intercept or manipulate network traffic, establish persistent footholds, or launch further attacks against internal systems. This is particularly concerning for enterprises, public institutions, and critical infrastructure operators using these devices to extend wireless coverage. The lack of vendor response and absence of patches exacerbate the threat, as organizations may be forced to rely on workarounds or device replacement. Additionally, the remote and unauthenticated nature of the exploit lowers the barrier for attackers, increasing the likelihood of targeted or opportunistic attacks. Confidentiality, integrity, and availability of network communications could be impacted, potentially leading to data breaches, service disruptions, or lateral movement within corporate networks.

Mitigation Recommendations

Given the absence of official patches, European organizations should immediately identify and inventory all affected Linksys range extender models and firmware versions within their networks. As a temporary mitigation, affected devices should be isolated from critical network segments and the internet to reduce exposure. Disabling remote management interfaces and restricting access to the wirelessAdvancedHidden endpoint via firewall rules or network segmentation can help limit attack vectors. Network monitoring should be enhanced to detect unusual command execution patterns or traffic anomalies indicative of exploitation attempts. Organizations should consider replacing vulnerable devices with models from vendors providing timely security updates. Additionally, implementing strict network access controls and employing intrusion detection/prevention systems can help detect and block exploitation attempts. Regular firmware audits and proactive vulnerability management processes should be established to prevent similar risks in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-01T17:06:27.764Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683d9584182aa0cae242f8b0

Added to database: 6/2/2025, 12:13:56 PM

Last enriched: 7/11/2025, 8:03:40 AM

Last updated: 8/18/2025, 11:34:31 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats